Linksys is bringing back the heritage of the best-selling router of all time – the Linksys WRT54G but updated and modernized it with the most leading edge available Wireless-AC technology on the market.

The new Linksys WRT1900AC Dual Band Wi-Fi Router is inspired by the original WRT54G iconic blue/black stackable form factor but with a modernized spin as well as more powerful hardware such as a dual-core 1.2 GHz processor, four removable antennas (instead of the standard three) and eSata and USB 2.0/3.0 connectivity ports.

The new WRT1900AC ships with Linksys Smart Wi-Fi set-up and management tools and will be the first Linksys router to include the Network Map feature. Linksys has also been working with the OpenWRT community to make an open source firmware downloadable when product is available.

The new WRT provides the most robust specifications in its class and will be the world’s first open source compatible router to support a dual core 1.2 Ghz processor, 4 removable and customized antennas, 128MB flash memory and an eSATA port.

The Linksys Wireless AC 1900 Dual-Band Router is capable of speeds of up to 1.3Gbps on the 5 GHz band and up to 600 Mpbs on the 2.4 GHz band.

Open Source is a vehicle for other communities, such as DD-WRT, Open WRT, and Tomato, to create their own custom versions of open source firmware for the product. OpenWRT developers will be provided hardware and SDKs/APIs to begin creating custom firmware for the WRT1900AC.

An OpenWRT custom firmware for WRT1900AC is planned to be available for download online at availability in the spring 2014.

Spotlight

Microsoft Edge, the new browser in Windows 10, represents a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors that aren’t present in older versions.

35 percent of employees would sell information on company patents, financial records and customer credit card details if the price was right. This illustrates the growing importance for organizations to deploy data loss prevention strategies.

Sun Tzu's writings have been studied throughout the ages by professional militaries and can used to not only answer the question of whether or not we are in a cyberwar, but how one can fight a cyber-battle.

Infosec consultant Paul Moore came up with a working solution to thwart a type of behavioral profiling. The result is a Chrome extension called Keyboard Privacy, which prevents profiling of users by the way they type by randomizing the rate at which characters reach the DOM.